about summary refs log tree commit diff
path: root/app/models/domain_block.rb
blob: 05264190cb32359eb11d4fe94d4cccc7c3b42cf5 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
# frozen_string_literal: true
# == Schema Information
#
# Table name: domain_blocks
#
#  id              :bigint(8)        not null, primary key
#  domain          :string           default(""), not null
#  created_at      :datetime         not null
#  updated_at      :datetime         not null
#  severity        :integer          default("noop")
#  reject_media    :boolean          default(FALSE), not null
#  reject_reports  :boolean          default(FALSE), not null
#  force_sensitive :boolean          default(FALSE), not null
#  reason          :text
#  reject_unknown  :boolean          default(FALSE), not null
#  processing      :boolean          default(TRUE), not null
#  manual_only     :boolean          default(FALSE), not null
#

class DomainBlock < ApplicationRecord
  include DomainNormalizable

  enum severity: [:noop, :force_unlisted, :silence, :suspend]

  validates :domain, presence: true, uniqueness: true

  has_many :accounts, foreign_key: :domain, primary_key: :domain
  delegate :count, to: :accounts, prefix: true

  scope :matches_domain, ->(value) { where(arel_table[:domain].matches("%#{value}%")) }
  scope :unprocessed, -> { where(processing: true) }
  scope :with_user_facing_limitations, -> { where(severity: [:silence, :suspend]).or(where(reject_media: true)).or(where(reject_unknown: true).or(where(manual_only: true))) }

  before_save :set_processing

  class << self
    def suspend?(domain)
      !!rule_for(domain)&.suspend?
    end

    def silence?(domain)
      !!rule_for(domain)&.silence?
    end

    def reject_media?(domain)
      !!rule_for(domain)&.reject_media?
    end

    def reject_reports?(domain)
      !!rule_for(domain)&.reject_reports?
    end

    def force_unlisted?(domain)
      !!rule_for(domain)&.severity == 'force_unlisted'
    end

    alias blocked? suspend?

    def rule_for(domain)
      return if domain.blank?

      uri      = Addressable::URI.new.tap { |u| u.host = domain.gsub(/[\/]/, '') }
      segments = uri.normalized_host.split('.')
      variants = segments.map.with_index { |_, i| segments[i..-1].join('.') }

      where(domain: variants[0..-2]).order(Arel.sql('char_length(domain) desc')).first
    end
  end

  def stricter_than?(other_block)
    return true if suspend?
    return false if other_block.suspend? && !suspend?
    return false if other_block.silence? && (noop? || force_unlisted?)
    return false if other_block.force_unlisted? && noop?
    (reject_media || !other_block.reject_media) && (reject_reports || !other_block.reject_reports)
  end

  def affected_accounts_count
    scope = suspend? ? accounts.where(suspended_at: created_at) : accounts.where(silenced_at: created_at)
    scope.count
  end

  def additionals
    additionals = []
    additionals << "force sensitive media" if force_sensitive?
    additionals << "reject media" if reject_media?
    additionals << "reject reports" if reject_reports?
    additionals << "reject unknown accounts" if reject_unknown?
    additionals << "manual trust only" if manual_only?
    additionals
  end

  def template
    self.attributes.except('id', 'domain', 'created_at', 'updated_at', 'processing')
  end

  # workaround for the domain policy editor
  def undo
    false
  end

  private

  def set_processing
    return if processing
    return unless (changed & %w(severity suspended_at silenced_at force_sensitive reject_media reject_reports reject_unknown manual_only)).any?

    self.processing = true
  end
end